One March many years ago, when the IT industry was rather different compared to the modern one, two computer viruses brought panic because of an out-of-scale media attention. Born out of a time when the “malware” (an unknown term then) creators were largely interested in fame more than money, the viruses ended up making substantial damages valued (in one of the two cases) more than 1 billion dollars.
Austrian eighteen years old Peter Kleissner recently become famous for being the author of Stoned, the tool which exploits Master Boot Record rootkits techniques to bypass Microsoft operating systems protections and allow the execution of unauthorized code – be it legit or not. But the popularity the young programmer gained thanks to Stoned caused disagreeing reactions by security market companies.
As security experts have already highlighted in this months and years, the trend of the most sophisticated malicious code is to be able to reach the lowest levels of the machine to infect, putting out of the game all the security mechanisms and gaining full control of the PC and the operating system. This trend embraces more and more the term “bootkit”, literally a bootable rootkit, on which the attentions of researchers and Assembly code enthusiasts have recently focused uncovering new, potential threats with an ancient heart and dangerous security flaws sold as malware-proof security measures.